US7119703B2 - Die anti-tampering sensor - Google Patents
Die anti-tampering sensor Download PDFInfo
- Publication number
- US7119703B2 US7119703B2 US10/926,506 US92650604A US7119703B2 US 7119703 B2 US7119703 B2 US 7119703B2 US 92650604 A US92650604 A US 92650604A US 7119703 B2 US7119703 B2 US 7119703B2
- Authority
- US
- United States
- Prior art keywords
- metal wire
- wire loop
- logical
- integrated circuits
- tampering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related, expires
Links
Images
Classifications
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L23/00—Details of semiconductor or other solid state devices
- H01L23/57—Protection from inspection, reverse engineering or tampering
- H01L23/576—Protection from inspection, reverse engineering or tampering using active circuits
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/86—Secure or tamper-resistant housings
- G06F21/87—Secure or tamper-resistant housings by means of encapsulation, e.g. for integrated circuits
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01L—SEMICONDUCTOR DEVICES NOT COVERED BY CLASS H10
- H01L2924/00—Indexing scheme for arrangements or methods for connecting or disconnecting semiconductor or solid-state bodies as covered by H01L24/00
- H01L2924/0001—Technical content checked by a classifier
- H01L2924/0002—Not covered by any one of groups H01L24/00, H01L24/00 and H01L2224/00
Definitions
- the present invention generally relates to the general field of protecting integrated circuits against unwanted intrusion or tampering. More particularly, this invention relates to a sensor circuit and a method, which uses metal wire loops to protect integrated circuit dies from unwanted tampering.
- circuitry and memory of certain integrated circuits are sensitive and need to be protected from unwanted tampering.
- Various applications such as automatic teller machines, ATMs, require a high level of protection from external tampering and deciphering of the circuitry and memory.
- pay-per-view television cable boxes require protection against intruders who may attempt to steal cable services by tampering with circuits and memory within the cable boxes.
- Previous means of protecting circuits include passivation layers covering the sensitive electronic layers.
- Security boxes also have been used to enclose the sensitive circuitry.
- Electronic techniques include imbedding security microprocessor macros on the same chip as the circuitry to be protected. These security processor macros have the means of generating random keys and other cryptographic data objects which are used to render the contents of memory such as electrically erasable programmable read only memory (EEPROM) unreadable even if the data is successfully obtained.
- EEPROM electrically erasable programmable read only memory
- a metal wire loop located in a metallization layer above the integrated circuits to be protected.
- There is a semiconductor load device which charges said metal wire loop to a logical ‘1’ level.
- There is a multiplicity of semiconductor devices which discharge said metal wire loop to a logical ‘0’ level at certain periodic times.
- there is a NAND logic gate with logic inputs, placed among said integrated circuits.
- a multiplicity of vias connecting a multiplicity of points along said metal wire loop down to said semiconductor devices allow the discharge of said metal wire loop to a logical ‘0’ level at certain periodic times.
- the circuit and method has metal wire loops placed over the circuitry and memory to be protected.
- the objects of this invention are further achieved by utilizing multiple NAND gates which are fed by groups of vias from the metal wire loop.
- the outputs of these NAND gates are sent to the inputs of an OR gate.
- the output of the OR gate is the collective security alarm signal.
- the objects of this invention are further achieved by placing multiple metal wire loops over different sections of the integrated circuit if the sensitive circuitry needs to be protected in isolated sections.
- the different metal wire loops feed separate NAND gates which feed separate OR gates to produce separate security alarm signals. These separate security alarm signals can initiate separate security actions for their respective circuits or memory.
- FIG. 1 shows a circuit schematic of the main embodiment of this invention.
- FIG. 2 shows a nodal view of the metal wire loop of the main embodiment of this invention.
- FIG. 3 shows extended applications of the main embodiment of this invention.
- FIG. 1 shows the main embodiment of this invention. It shows a metal wire loop 11 on top of circuitry in an integrated circuit die. The wire loop is placed over the circuitry or memory, which is to be secured from intrusion.
- the figure also shows a control clock waveform 30 , which feeds the gates of devices 40 , 41 , 42 , 43 , and 44 .
- the metal wire loop is made up of a metallization layer within the semiconductor die.
- the loop could also be implemented with polysilicon or other conductive material.
- the geometry and spacing of the metal wire loop is dictated by the dimensions of the circuit & memory region and by the line widths and spacings and device dimensions within the circuitry to be protected.
- the fingers of the metal wire loop must be close enough to each other to prevent an unwanted probing or tampering of the circuitry below the metal wire loop.
- FIG. 1 also shows via pairs spaced periodically on the metal wire loop.
- the figure shows the via pair VD 56 and VN 57 .
- Via VD represents a connection from the metal wire loop 11 down to the drain diffusion of discharge NMOS FET 40 .
- Via VN represents a connection from the metal wire loop 11 down to an input to a logical NAND gate.
- the via pairs are distributed across the length of the metal wire loop.
- the vias divide the metal wire loop into smaller metal segments.
- the multiplicity of VN vias, which go down and feed inputs to the NAND logic gate 10 allows the VN vias to be close to any potential metal wire loop intrusion or line break.
- any line break or intrusion along the length of the metal wire loop will cause the metal wire loop segment to discharge from a logical ‘1’ to a logical ‘0’. This is because the metal wire loop is separated from the PMOS charging ‘load’ device 44 by the intrusion line break. This ‘1’ to ‘0’ transition is transmitted from the metal wire loop line break down to the NAND gate 10 input 60 – 63 by way of via, VN.
- a discharge via are spaced across the length of the metal wire loop to allow the periodic discharge of the metal wire loop node. This periodic charging and discharging of the metal wire loop is implemented to allow tampering to be detected if the tampering is done after powering up the chip.
- FIG. 1 shows a control clock 30 attached to the gate line of the discharge devices 40 , 41 , 42 , & 43 .
- This clock waveform defines the control states for the discharge process described in the previous paragraph.
- the control clock is at an active 1 level 32 , the waveform is labeled ‘D’ for discharge. This is when the discharge devices 40 , 41 , 42 , and 43 are turned ON allowing the metal wire loop node 11 to discharge to ground through discharge devices 40 , 41 , 42 , & 43 .
- the control clock waveform 30 when the control clock waveform 30 is low, the metal wire loop node 11 is charged to a ‘I’ level.
- the load device 44 is allowed to charge up the metal wire loop node 11 .
- This charge time is denoted by ‘ch’ in FIG. 1 .
- time of the control clock waveform 30 that the circuit is able to “sense” a break in the metal wire loop by the process explained earlier.
- the ‘D’ pulse width ‘W’ is a small percentage of the period, ‘T’.
- the NAND gate 10 shown in FIG. 1 detects any ‘1’ to ‘0’ transition on any of its inputs 60 , 61 , 62 , or 63 .
- inputs 60 , 61 , 62 , or 63 are tied to the vias VN such as 50 , 52 , 54 , and 56 shown in FIG. 1 .
- These vias, VN are attached to the metal wire loop at various points.
- the voltage level of one or more of the vias VN will go low if there is a break in the metal wire loop near the given via, VN.
- the output 40 of the NAND gate will go high. This high output is used to sound an alarm or to produce other security actions. These security actions could include erasure of memory, programmable read only memories, and changes of secure cryptography keys and signals.
- FIG. 2 shows the same embodiment as in FIG. 1 , but it represents the metal wire loop 230 as a straight-line node.
- This metal wire loop 230 has five vias pairs shown (VD 1 , VN 1 , VD 2 , VN 2 , VD 3 , VN 3 , VD 4 , VN 4 , VD 5 , and VN 5 ).
- FIG. 2 illustrates a case where there is an intrusion or break in the metal wire loop node 230 at location 220 .
- This break 220 causes the section of metal wire loop near via VN 2 to be disconnected from the PMOS charging load device 240 .
- the charging PMOS device 240 is no longer attached to the metal wire loop 230 in the vicinity of VN 2 .
- the inability to transit from ‘0’ to ‘1’ causes the NAND gate 270 output which is the Alarm 260 to go high.
- FIG. 2 shows the discharge devices 211 – 215 which are turned ON periodically by the control clock 210 .
- the control clock 210 pulses ON periodically for a short time as mentioned previously to discharge excess charge from the metal wire loop node 230 . This periodic discharge allows the detection of a metal wire loop break via the switching current discharge mechanism mentioned above.
- FIG. 1 shows the simplicity of the sensor circuit of this invention. It uses simple metal wire loops over circuit devices on lower semiconductor levels. It uses simple NMOS FET transistors as discharge devices, and it uses simple PMOS charging load devices. It uses simple semiconductor NAND and Or logic gates. These simple elements allow this sensor circuit to easily be implemented with most integrated circuits.
- An extension of the circuit in FIG. 1 is achieved by utilizing multiple NAND gates which are fed by groups of vias from the metal wire loop. The outputs of these NAND gates are sent to the inputs of an OR gate. The output of the OR gate is the collective security alarm signal. This is shown in FIG. 3 .
- FIG. 3 Another extension of the circuit in FIG. 1 is cascading or combining NAND gates with OR gates. This is illustrated in FIG. 3 . This would allow several N-wide NAND gate subsystems with separate metal wire loops to exist on the integrated circuit die. The outputs of these NANDS would feed an ‘OR’ circuit which would detect a ‘1’ level. This ‘1’ level would indicate that one of the metal wire loops was broken within one of the NAND gate sub systems shown in FIG. 1 .
- FIG. 3 Another extension of the circuit in FIG. 1 is achieved by placing multiple metal wire loops over different sections of the integrated circuit if different types of sensitive circuitry needs to be protected in separate isolated sections.
- This circuit extension is shown in FIG. 3 .
- the different metal wire loops feed separate NAND gates 331 – 333 , 341 – 342 which feed separate OR gates 310 , 320 to produce separate security alarm signals, Alarm 1 and Alarm 2 ( 310 , 320 ).
- These separate security alarm signals can initiate separate security actions for their respective circuits or memory. For example, one security alarm signal generated by the metal wire loops protecting EEPROM circuits may result in the automatic erasure of the EEPROM programming. Another security alarm signal generated by the metal wire loops protecting RAM circuits may result in the erasure of the RAM contents.
- the VN vias are used to detect a voltage discharge caused by a metal wire line break and to transmit this voltage discharge to the input of a NAND gate.
- the VD vias are for periodically connecting the metal wire loop to a discharge path to ground to prepare for detection of a metal wire line break, after the charging process.
- the advantages of this invention are that it senses any disruption of the wire path. As a result of the disruption, an alarm signal is generated which can activate actions, which will destroy sensitive data. Also, the circuit of this invention is very easy to implement in standard device technology. Another big advantage is that this circuit does not consume static power. It only consumes switching power when charge/discharge is activated.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Microelectronics & Electronic Packaging (AREA)
- Power Engineering (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Condensed Matter Physics & Semiconductors (AREA)
- Semiconductor Integrated Circuits (AREA)
- Storage Device Security (AREA)
Abstract
Description
-
- U.S. Pat. No. 5,533,123 (Force et al.) describes a Secured Processing Unit (SPU) chip, a microprocessor designed especially for secure data processing. The system is based on 3 interrelated systems: 1) detectors to alert the SPU of an attack, 2) filters to weigh the severity of the attack, 3) responses or countermeasures to deal with the attacks. The system provides much flexibility via programming the SPU.
- U.S. Pat. No. 5,881,155 (Rigal) describes a security device for preventing access to confidential information stored in a semiconductor chip, or protected chip. The security device comprises a second semiconductor chip, or protective chip, with the two chips facing each other and being coupled to each other by communication terminals. The protective chip can measure resistances through the semiconductor resin and can determine, at least from the measured resistances, an encryption key intended to be communicated to the protect chip to protect the confidential information.
- U.S. Pat. No. 6,245,992 (Hou) describes a an integrated circuit (IC) chip security box which includes a top cover member and a bottom cover member to enclose an IC chip mounted to the circuit board. The cover members are made of conductive material for blocking radio frequency emission from the IC chip. Conductive members are formed on one of the cover members and the circuit board and engage with each other when the security box is mounted to the circuit board thereby forming an electrical loop. Unauthorized opening of the security box breaks the electrical loop thereby causing a signal to the IC chip to initiate a purging process which deletes program codes written in the chip and prevents unauthorized copy of the codes.
Claims (40)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/926,506 US7119703B2 (en) | 2004-08-26 | 2004-08-26 | Die anti-tampering sensor |
SG200502292A SG120217A1 (en) | 2004-08-26 | 2005-04-14 | Die anti-tampering sensor |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US10/926,506 US7119703B2 (en) | 2004-08-26 | 2004-08-26 | Die anti-tampering sensor |
Publications (2)
Publication Number | Publication Date |
---|---|
US20060044138A1 US20060044138A1 (en) | 2006-03-02 |
US7119703B2 true US7119703B2 (en) | 2006-10-10 |
Family
ID=35942298
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/926,506 Expired - Fee Related US7119703B2 (en) | 2004-08-26 | 2004-08-26 | Die anti-tampering sensor |
Country Status (2)
Country | Link |
---|---|
US (1) | US7119703B2 (en) |
SG (1) | SG120217A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7551098B1 (en) * | 2005-05-28 | 2009-06-23 | Zilog, Inc. | Point of sale terminal having pulsed current tamper control sensing |
US9189656B1 (en) | 2014-11-25 | 2015-11-17 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | IC chip package disabling device |
US10216452B2 (en) | 2016-07-14 | 2019-02-26 | Nxp Usa, Inc. | Breach detection in integrated circuits |
Families Citing this family (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9941223B2 (en) * | 2014-08-08 | 2018-04-10 | The Charles Stark Draper Laboratory, Inc. | Devices and methods for detecting counterfeit semiconductor devices |
US10817768B1 (en) | 2019-12-20 | 2020-10-27 | Capital One Services, Llc | Systems and methods for preventing chip fraud by inserts in chip pocket |
US11049822B1 (en) | 2019-12-20 | 2021-06-29 | Capital One Services, Llc | Systems and methods for the use of fraud prevention fluid to prevent chip fraud |
US10888940B1 (en) | 2019-12-20 | 2021-01-12 | Capital One Services, Llc | Systems and methods for saw tooth milling to prevent chip fraud |
US10977539B1 (en) | 2019-12-20 | 2021-04-13 | Capital One Services, Llc | Systems and methods for use of capacitive member to prevent chip fraud |
US10810475B1 (en) | 2019-12-20 | 2020-10-20 | Capital One Services, Llc | Systems and methods for overmolding a card to prevent chip fraud |
US11621234B2 (en) | 2020-03-27 | 2023-04-04 | Semiconductor Components Industries, Llc | Chip tampering detector |
US11715103B2 (en) | 2020-08-12 | 2023-08-01 | Capital One Services, Llc | Systems and methods for chip-based identity verification and transaction authentication |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4132987A (en) * | 1977-10-26 | 1979-01-02 | Devereaux Richard A | Security system |
US4357601A (en) * | 1980-09-02 | 1982-11-02 | Bell Telephone Laboratories, Incorporated | Tamper protection for an automatic remote meter reading unit |
US5097253A (en) * | 1989-01-06 | 1992-03-17 | Battelle Memorial Institute | Electronic security device |
US5533123A (en) | 1994-06-28 | 1996-07-02 | National Semiconductor Corporation | Programmable distributed personal security |
US5543782A (en) * | 1993-11-16 | 1996-08-06 | Protex International Corp. | Security device for merchandise and the like |
US5561417A (en) * | 1993-12-28 | 1996-10-01 | Protex International Corp. | Security device for merchandise and the like |
US5881155A (en) | 1996-04-01 | 1999-03-09 | Schlumberger Industries | Security device for a semiconductor chip |
US6245992B1 (en) | 1999-06-15 | 2001-06-12 | Geneticware Co., Ltd. | IC chip security box |
US20050146435A1 (en) * | 2003-03-26 | 2005-07-07 | Proximities, Inc. | Non-reusable identification device |
US20050179548A1 (en) * | 2004-02-13 | 2005-08-18 | Kittel Mark D. | Tamper monitoring article, system and method |
-
2004
- 2004-08-26 US US10/926,506 patent/US7119703B2/en not_active Expired - Fee Related
-
2005
- 2005-04-14 SG SG200502292A patent/SG120217A1/en unknown
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4132987A (en) * | 1977-10-26 | 1979-01-02 | Devereaux Richard A | Security system |
US4357601A (en) * | 1980-09-02 | 1982-11-02 | Bell Telephone Laboratories, Incorporated | Tamper protection for an automatic remote meter reading unit |
US5097253A (en) * | 1989-01-06 | 1992-03-17 | Battelle Memorial Institute | Electronic security device |
US5543782A (en) * | 1993-11-16 | 1996-08-06 | Protex International Corp. | Security device for merchandise and the like |
US5561417A (en) * | 1993-12-28 | 1996-10-01 | Protex International Corp. | Security device for merchandise and the like |
US5533123A (en) | 1994-06-28 | 1996-07-02 | National Semiconductor Corporation | Programmable distributed personal security |
US5881155A (en) | 1996-04-01 | 1999-03-09 | Schlumberger Industries | Security device for a semiconductor chip |
US6245992B1 (en) | 1999-06-15 | 2001-06-12 | Geneticware Co., Ltd. | IC chip security box |
US20050146435A1 (en) * | 2003-03-26 | 2005-07-07 | Proximities, Inc. | Non-reusable identification device |
US20050179548A1 (en) * | 2004-02-13 | 2005-08-18 | Kittel Mark D. | Tamper monitoring article, system and method |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7551098B1 (en) * | 2005-05-28 | 2009-06-23 | Zilog, Inc. | Point of sale terminal having pulsed current tamper control sensing |
US9189656B1 (en) | 2014-11-25 | 2015-11-17 | Lenovo Enterprise Solutions (Singapore) Pte. Ltd. | IC chip package disabling device |
US10216452B2 (en) | 2016-07-14 | 2019-02-26 | Nxp Usa, Inc. | Breach detection in integrated circuits |
Also Published As
Publication number | Publication date |
---|---|
SG120217A1 (en) | 2006-03-28 |
US20060044138A1 (en) | 2006-03-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP1532683B1 (en) | Prevention of tampering in electronic devices | |
US7005733B2 (en) | Anti tamper encapsulation for an integrated circuit | |
US6895509B1 (en) | Tamper detection system for securing data | |
US7119703B2 (en) | Die anti-tampering sensor | |
JP5387144B2 (en) | Malfunction occurrence attack detection circuit and integrated circuit | |
US7969763B2 (en) | Detector circuit for detecting an external manipulation of an electrical circuit, circuit arrangement comprising a plurality of detector circuits, memory device and method for operating a detector circuit | |
US9747472B2 (en) | Mesh grid protection | |
US20080059741A1 (en) | Detecting radiation-based attacks | |
JPH0787237B2 (en) | Integrated circuit chip | |
US7080001B2 (en) | System for monitoring a period of an operation clock signal of a CPU and stopping operations of the CPU when the period is out of a predetermined allowable range | |
US6359338B1 (en) | Semiconductor apparatus with self-security function | |
KR100883457B1 (en) | Device and method for non-volatile storage of a status value | |
JPS63124153A (en) | Memory information protector | |
US20100299756A1 (en) | Sensor with a circuit arrangement | |
JP2001244414A (en) | Semiconductor integrated circuit | |
US7570532B1 (en) | Overwriting memory cells using low instantaneous current | |
US8174285B2 (en) | Component provided with an integrated circuit comprising a cryptorocessor and method of installation thereof | |
US20050044403A1 (en) | Detection circuit for a smart card | |
US20060050876A1 (en) | Integrated circuit with coded security signal, security process, corresponding security device and signal coded using a dynamic key | |
US20030133241A1 (en) | Method and arrangement for protecting digital parts of circuits | |
JP2000076140A (en) | Semiconductor integrated circuit | |
US20030182562A1 (en) | Use detecting circuit | |
KR20030055745A (en) | Electronic chip attack detector device | |
US10216452B2 (en) | Breach detection in integrated circuits | |
JP4181068B2 (en) | Integrated circuit module |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: FTD SOLUTIONS PTE., LTD., SINGAPORE Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:SIN, LIM ENG;REEL/FRAME:015739/0153 Effective date: 20040819 |
|
AS | Assignment |
Owner name: ROXAS ASSETS LIMITED, VIRGIN ISLANDS, BRITISH Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:FTD SOLUTIONS PTE. LTD.;REEL/FRAME:022368/0200 Effective date: 20081231 |
|
FPAY | Fee payment |
Year of fee payment: 4 |
|
AS | Assignment |
Owner name: KARMIC DESIGN-USA, LLC, TEXAS Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:ROXAS ASSETS LIMITED;REEL/FRAME:032815/0688 Effective date: 20140502 |
|
REMI | Maintenance fee reminder mailed | ||
FPAY | Fee payment |
Year of fee payment: 8 |
|
SULP | Surcharge for late payment |
Year of fee payment: 7 |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.) |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20181010 |